2018 4th International Conference on Computer and Technology Applications (ICCTA)最新文献

筛选
英文 中文
Pre-coding technique for adaptive threshold detectors in diffusion-based molecular communications 扩散分子通信中自适应阈值检测器的预编码技术
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398656
A. Jamshidi, Arzhang Shahbazi
{"title":"Pre-coding technique for adaptive threshold detectors in diffusion-based molecular communications","authors":"A. Jamshidi, Arzhang Shahbazi","doi":"10.1109/CATA.2018.8398656","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398656","url":null,"abstract":"Molecular Communication (MC) is a subject in medicine, biology and communication engineering. This new paradigm is introduced to carry messages between nano-machines. Because of their size, one of the primary limitation of these devices is their computation capability. For this reason, the proposed ideas regarding MC should be as low complex as possible. Due to the random propagation of molecules, intersymbol interference becomes a major restriction in MC. The majority of ISI combating techniques in literature are implemented at receiver side. In this contribution, a new pre-coding algorithm is introduced at transmitter side to mitigate the intersymbol interference for adaptive threshold detectors. This algorithm will ensure us that we can utilise these detectors in different situations. Our analytical and numerical results indicate that the proposed scheme will provide a significant performance boost regarding these detectors.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Triple Helix Model: University-industry-governments linkage web-based application recommendation systems for emerging commercial-base research 三螺旋模型:大学-工业-政府联动的基于网络的应用推荐系统,用于新兴的商业基础研究
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398664
Kanyakit Keerati-angkoon, R. Pichyangkura
{"title":"The Triple Helix Model: University-industry-governments linkage web-based application recommendation systems for emerging commercial-base research","authors":"Kanyakit Keerati-angkoon, R. Pichyangkura","doi":"10.1109/CATA.2018.8398664","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398664","url":null,"abstract":"The main purpose of this study is to develop innovative tool for supporting The Triple Helix Model: University-Industry-Governments Linkage. Web-based application recommendation system had been developed for creating the motivation for academic researcher to conduct commercial-based Research. Information Retrieval and Documentation Indexing technique were used in the web-based systems. In order to ensure system reliability and users intending to use, information retrieval model validation are tested. As the result, the systems enhance the efficiency and effectiveness of the linkage-process among the players of innovation network which are researchers, industry, public or private institutes, or technology transferred office. This process will aid researcher to emerge the commercial-based research and lead to research commercialization process in the next step.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependent task scheduling algorithm in distributed system 分布式系统中的依赖任务调度算法
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398662
Linfang Qin, F. Ouyang, Guixi Xiong
{"title":"Dependent task scheduling algorithm in distributed system","authors":"Linfang Qin, F. Ouyang, Guixi Xiong","doi":"10.1109/CATA.2018.8398662","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398662","url":null,"abstract":"In order to improve the performance of tasks with dependencies in distributed environment and to overcome the shortcomings of existing table scheduling algorithms, the idea of table scheduling and task replication is combined to propose a heuristic task based on critical path and task replication Scheduling Algorithm (HCPTD). The algorithm improves the calculation method of task weight, and obtains the scheduling sequence according to whether it is the mission-critical or descending order of weight. The processor chooses the earliest task completion time and the shortest task-to-exit node distance. Experimental results show that HCPTD effectively improves the scheduling performance of distributed systems.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Green computing: Awareness and practices 绿色计算:意识和实践
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398646
A. Abugabah, Amira Abubaker
{"title":"Green computing: Awareness and practices","authors":"A. Abugabah, Amira Abubaker","doi":"10.1109/CATA.2018.8398646","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398646","url":null,"abstract":"This study is an attempt to measure the level of green computing knowledge and awareness of university students. A quantitative research approach was used in this study, and data were collected through a survey designed to this purpose. Different statistical methods were utilized including factor analysis and t-test regression to analyze the data and to test the study hypotheses. The results indicated that the level of knowledge of green computing among students is high. However, even with having that amount of knowledge, their daily practices of green computing are not adequate. The results also showed that there is a need to provide workshops and training programs to students for increasing their awareness about green computing.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Personal data protection maturity model for the micro financial sector in Peru 秘鲁小额金融部门个人数据保护期限模型
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398649
Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza
{"title":"Personal data protection maturity model for the micro financial sector in Peru","authors":"Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza","doi":"10.1109/CATA.2018.8398649","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398649","url":null,"abstract":"The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Raspberry Pi and computers-based face detection and recognition system 树莓派和基于计算机的人脸检测和识别系统
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398677
Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed
{"title":"Raspberry Pi and computers-based face detection and recognition system","authors":"Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed","doi":"10.1109/CATA.2018.8398677","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398677","url":null,"abstract":"This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Automatically generate a specific human computer interaction from an interface diagram model 从接口图模型自动生成特定的人机交互
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398671
William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby
{"title":"Automatically generate a specific human computer interaction from an interface diagram model","authors":"William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby","doi":"10.1109/CATA.2018.8398671","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398671","url":null,"abstract":"The diversity of interaction mode and the constant growth of user requirements bring new challenges to the Human Computer Interaction (HCI). It turns out that the user is interested in interacting with an interactive system according to his level of knowledge. Thus, in this article we have automatically generated the multiplatform HCI that is most adapted to the needs of the users from an interface skeleton. For example, the SEF (Schéma d'Enchaînement de Fenêtre) Windows, which is an interface model allowing to create an interface mockup. It offers more widgets and graphical elements to design an interface. The aim of this paper is automatically generating a new specific HCI from the already existing SEF model. The transformation is based on metamodel and we use the Model Driven Engineering (MDE) approach. Thus, a transformation rules are created to automatically generate a specific interface.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Academic advising system using data mining method for decision making support 学术咨询系统采用数据挖掘方法进行决策支持
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398651
Riah F. Elcullada-Encarnacion
{"title":"Academic advising system using data mining method for decision making support","authors":"Riah F. Elcullada-Encarnacion","doi":"10.1109/CATA.2018.8398651","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398651","url":null,"abstract":"With the high drop-out rates of college students across the Sultanate of Oman, the government urges HEIs to undertake ongoing analysis of its student population profile and evaluate the effectiveness of their academic advisory services. It is for this reason that this study intends to introduce an Online Student Academic Advising System for higher education, particularly to the Oman Tourism College (OTC). The developed system facilitates academic advising activities and keeps track of student's academic performance. By utilizing data mining method, the system is also capable of generating the required data set that can be used for data analysis and data modeling to discover useful knowledge regarding students' profile, students' registration, and students' module marks. The results of data mining in graphs and tables are very essential for OTC to make timely decisions and implement appropriate actions. The study was carried out using several stages of Developmental Research Method. By utilizing Quantitative Methodology from close-ended statements of the feedback survey, student participants were asked to evaluate the compliance of the developed system in accordance to the Industry Standard Organization 9126-1 (SQUARE ISO/IEC 9126-1:2001) software quality standards. The results showed that the system is a significant improvement for OTC and had a high level of compliance with the established software quality standards.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data privacy in cloud computing 云计算中的数据隐私
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398650
Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani
{"title":"Data privacy in cloud computing","authors":"Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani","doi":"10.1109/CATA.2018.8398650","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398650","url":null,"abstract":"Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud server processes it; the mystery behind this is that fully homomorphic encryption schemes allow processing encrypted data without the need of a prior decryption. In this paper we present a new fully homomorphic encryption scheme from integers. Our encryption scheme can be used essentially to secure sensible data in cloud computing. The proposed scheme uses a large integer ring as cleartext space and one key for encryption and decryption, i.e. it is a symmetric encryption scheme.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Impact of ERP usage on organizational effectiveness: An empirical investigation 使用企业资源规划系统对组织效率的影响:实证调查
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398665
F. Aburub
{"title":"Impact of ERP usage on organizational effectiveness: An empirical investigation","authors":"F. Aburub","doi":"10.1109/CATA.2018.8398665","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398665","url":null,"abstract":"Achieving organizational effectiveness is considered high priority in many organizations around the world. Using technologies can be used to do that. This article aims to examine the influence of ERP Usage on Organizational Effectiveness in commercial banks in Jordan. A new research model has been proposed. The results show that there is a positive influence of using ERP on organizational effectiveness. Final, future research has been suggested to validate the proposed research model using different domains.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信